General
-
Target
5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5.exe
-
Size
685KB
-
Sample
241112-mgrt5atmgl
-
MD5
1cdf67ab2f6877fc464f6b8dc3ebefa0
-
SHA1
898e968c7adfece017d1918730bf7e2e63ccbc56
-
SHA256
5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5
-
SHA512
854ec7a036053210e75a4ace64e10317b9c05d5a77051c17254ea9371e9876843430a4815a15e126beca4ad288e79031f60121c82dec3380a1cdf850fcdaf413
-
SSDEEP
12288:fgWVeEfxkEmbGq3rNV22td/HSLthAYLdG85KJDJVkA2/+L6N:4WVeEZNmN3P22X6RNyDJyA2WLs
Static task
static1
Behavioral task
behavioral1
Sample
5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8142299351:AAFDTrtIpOoWWO5SiyZfI7QSQ2VJ59N65c8/sendMessage?chat_id=595808702
Targets
-
-
Target
5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5.exe
-
Size
685KB
-
MD5
1cdf67ab2f6877fc464f6b8dc3ebefa0
-
SHA1
898e968c7adfece017d1918730bf7e2e63ccbc56
-
SHA256
5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5
-
SHA512
854ec7a036053210e75a4ace64e10317b9c05d5a77051c17254ea9371e9876843430a4815a15e126beca4ad288e79031f60121c82dec3380a1cdf850fcdaf413
-
SSDEEP
12288:fgWVeEfxkEmbGq3rNV22td/HSLthAYLdG85KJDJVkA2/+L6N:4WVeEZNmN3P22X6RNyDJyA2WLs
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-